About, hacking wireless WEP key. It takes you ~10 minutes to do it depending on the signal strength.
You get the victim name and channel using any tool (ex kismet), you dump the traffic into a file, inject packets to make the process faster cause you need around 100k-500k of IVs captured. Then you crack the key with aircrack-ng (airsnort is history and no longer supported).

Note: you need a linux distro, you can do it on windows but it is more complicated...

Oops, I didn't notice your previous post! Of course aircrack-ng can be used to crack WPA and WPA2, but the scenario is a little different from cracking WEP.
And yeah, you are right, not any wireless card is supported by airodump and aireplay...
And no, I'm ready all the time to help, you can contact me on my email if you don't find me on vcoderz.

Hey Bro,I'm Replying Now Through A Cracked Wireless Connection WEP Cracking Is Very Easy.. And As Edgard Said, It Might Take 10 Minutes To Crack WEP! And Believe Me Some Times 2 Minutes And As Edgard Said You Need To Capture As Much IVs As You Can And Dump Them Into File And Then Use Aircrack-ng To Get The Key..

But WPA And WPA2 Cracking Have Different Technique Than WEP Cracking, For WPA(2) You Need To Capture A Four Way Handshake And Dump It Into A File And Then Use A Dictionary Attack Or A Bruteforce Attack To Get The Key!

Moreover, If You Want To Crack A Wireless Connection Your Wireless Card Must Support Monitoring And You Must Have The Appropriate Drivers And PATCHES Installed..

I Recommend You To Use The BackTrack Linux Distribution Which Contains Tons Of Hacking And Penetration Testing Tools (Including aircrack) With The Appropriate Patches Of The Supported Cards That Support Packet Re-Injection..

And Btw, To Be Able To Use airodump-ng, Your Card Must Be Switched To Monitoring Mode.. And In Order To Do That (Everything Is Under Linux Ok?) You Have To Know First The Name Of Your Wireless Interface.. Just Open The Terminal And Type:

iwconfig

Its Name May Be: wlan0, rausb0, auth0... etc

Well Now To Switch Your Wireless Card To Monitoring Mode (As Root

ifconfig wlan0 down (wlan0 Is The Name Of The Interface, It May Be Different For You!)

Then:

iwconfig wlan0 mode monitor

Then:

ifconfig wlan0 up

Ayt?

In Addition To The Above, There Are Three Types Of Attacking WEP Encrypted Wireless...

Interactive Attack: When A Client Is Connected To The Access PointFake Authentication: When Nobody Is Connected To The Access PointDeauthentication Attack: When Mac Address Filtering Is Enabled!

Bas Bel Mabda2, There Is No Wireless That Can't Be Cracked Man!
As You Captured The 4-Way Handshake, Maybe You Don't Wanna Use A Dictionary (Btw There Are Dictionaries With All Possible Combinations), Then You Can Use Bruteforcing.. You'll Tell Me That Bruteforcing May Take Ages To Crack The Password... Then Very Powerful Computers And Hardware And Maybe Clustering Would Solve The Problem..
Ok Nobody Will Buy Expensive Super Computer To Crack A Wireless Password But Countries And Governments Would Do It!
And Btw The New Technology Of Cracking Depeneds On The Power Of The Process Unit Of The VGA Instead Of The CPU! Because The Perfomance Of A Powerful GPU Would Be About 60 Times Faster And Powerful Than A Core2Quade CPU!